It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it!...

53
RIPE 77 It’s DNS Jim, but not as we know it! It’s DNS Jim, but not as we know it! Sara Dickinson [email protected] sinodun.com @SinodunCom

Transcript of It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it!...

Page 1: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

It’s DNS Jim, but not as we know it!

Sara Dickinson [email protected] sinodun.com

@SinodunCom

Page 2: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

What this talk will cover

• New IETF standards: Encrypted transports for DNS (TLS & HTTPS)

• Deployment Status: Clients and resolver services for encrypted DNS

• DNS resolution directly from applications: Browsers • DNS resolution to third party providers: Implications for operators

2

Stub to recursive

Overview: Summarise the most recent evolutions in how end-device DNS resolution is being done (~past 5 years)

Page 3: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

My Background• Co-founder of Sinodun IT - small UK based consultancy

• Focussed on DNS, DNSSEC and DNS Privacy • R&D, Open source dev, Standards dev

• DNS-over-TLS: involved in standards dev, implementation and deployment (we contribute to dnsprivacy.org).

• DNS-over-HTTPS: Not directly involved, no links to browser vendors

3

Page 4: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

My Background• Co-founder of Sinodun IT - small UK based consultancy

• Focussed on DNS, DNSSEC and DNS Privacy • R&D, Open source dev, Standards dev

• DNS-over-TLS: involved in standards dev, implementation and deployment (we contribute to dnsprivacy.org).

• DNS-over-HTTPS: Not directly involved, no links to browser vendors

3

Goal today is to bring awareness to this audience of fast moving changes: The good, the bad and the ugly….

Page 5: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

The DNS is showing its age

• Nov 1987 - RFC1034 and RFC1035 published!

4

1987

2018

No Security or Privacy in the original design!

Page 6: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DNS-over-TLS (DoT)

5

1987 20182012

2013 2016

Snowdon Revelations

RFC7258: Pervasive Monitoring

is an attackDPRIVE WG

formed

2014

Goals: 1) Encrypt Stub-Rec DNS 2) Think about Rec-Auth?

Page 7: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DNS-over-TLS (DoT)

5

1987 20182012

2013 2016

Snowdon Revelations

RFC7258: Pervasive Monitoring

is an attackDPRIVE WG

formed

RFC7858: DNS-over-TLS

2014

RFC7766: DNS-over-TCP

Goals: 1) Encrypt Stub-Rec DNS 2) Think about Rec-Auth?

Port 853

Page 8: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DNS-over-TLS (DoT) Status

6

Date Event

2015 - 2018

Implementations:

Clients: Android Pie, systemd, Stubby Servers: Unbound, Knot resolver, dnsdist, (BIND)

2015 - now Set of 20 test DoT servers

Nov 2017 Quad9 (9.9.9.9) offer DoT

Mar 2018 Cloudflare launch 1.1.1.1 with DoT

Page 9: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DNS-over-TLS (DoT) Status

6

Date Event

2015 - 2018

Implementations:

Clients: Android Pie, systemd, Stubby Servers: Unbound, Knot resolver, dnsdist, (BIND)

2015 - now Set of 20 test DoT servers

Nov 2017 Quad9 (9.9.9.9) offer DoT

Mar 2018 Cloudflare launch 1.1.1.1 with DoT

System stub resolvers: Need native Windows & macOS/iOS support

Page 10: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DNS-over-TLS (DoT) Status

6

Date Event

2015 - 2018

Implementations:

Clients: Android Pie, systemd, Stubby Servers: Unbound, Knot resolver, dnsdist, (BIND)

2015 - now Set of 20 test DoT servers

Nov 2017 Quad9 (9.9.9.9) offer DoT

Mar 2018 Cloudflare launch 1.1.1.1 with DoT

System stub resolvers: Need native Windows & macOS/iOS support

Easy to run a DoT server

Page 11: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

Encrypted DNS: the good…

• Defeats passive surveillance

• Server authentication if a name is manually configured(PKIX or DANE - RFC8310) • Prevents redirects, can’t intercept DNS queries • Increases ‘trust’ in service (DNSSEC, filtering…)

• Data integrity of transport - can’t inject spoofed responses

7

Page 12: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

Encrypted DNS: the good…

• Defeats passive surveillance

• Server authentication if a name is manually configured(PKIX or DANE - RFC8310) • Prevents redirects, can’t intercept DNS queries • Increases ‘trust’ in service (DNSSEC, filtering…)

• Data integrity of transport - can’t inject spoofed responses

7

Opportunistic DoT: just need IP address (Android Pie default)

Page 13: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

Encrypted DNS: the good…

• Defeats passive surveillance

• Server authentication if a name is manually configured(PKIX or DANE - RFC8310) • Prevents redirects, can’t intercept DNS queries • Increases ‘trust’ in service (DNSSEC, filtering…)

• Data integrity of transport - can’t inject spoofed responses

7

Opportunistic DoT: just need IP address (Android Pie default)

Strict DoT: need a name too

Page 14: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

Encrypted DNS: the bad & ugly…

• SNI still leaks (but not for long! draft-rescorla-tls-esni) • A dedicated port (853) can be blocked (443 fallback) • Resolver still sees all the traffic (who do you ‘trust’?)

• If using a resolver NOT on the local network (not available) • Breaks Split horizon DNS (fallback possible),

leaks internal names. Similar to e.g. using 8.8.8.8 but….

8

Page 15: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

Encrypted DNS: the bad & ugly…

• SNI still leaks (but not for long! draft-rescorla-tls-esni) • A dedicated port (853) can be blocked (443 fallback) • Resolver still sees all the traffic (who do you ‘trust’?)

• If using a resolver NOT on the local network (not available) • Breaks Split horizon DNS (fallback possible),

leaks internal names. Similar to e.g. using 8.8.8.8 but….

8

Encrypted traffic bypasses local monitoring & security policies

Page 16: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

Encrypted DNS: the bad & ugly…

• SNI still leaks (but not for long! draft-rescorla-tls-esni) • A dedicated port (853) can be blocked (443 fallback) • Resolver still sees all the traffic (who do you ‘trust’?)

• If using a resolver NOT on the local network (not available) • Breaks Split horizon DNS (fallback possible),

leaks internal names. Similar to e.g. using 8.8.8.8 but….

8

Encrypted traffic bypasses local monitoring & security policies

For DoT, seen as short term or rare…

Page 17: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it! 9

Page 18: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it! 9

…..to their own chosen cloud resolver service!

Page 19: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DNS-over-HTTPS (DoH)

10

1987Aug2018

May2017

Oct2017

DoH WGformed

Sep2017

DoH draft adopted

Goals: “This working group will standardize encodings for DNS queries and responses that are suitable for use in HTTPS. ”

First DoH draft published(query init)

March2017

IETF 98 Jul2017

Page 20: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DNS-over-HTTPS (DoH)

10

1987Aug2018

May2017

Oct2017

DoH WGformed

Submitted to IESG

Sep2017

DoH draft adopted

Goals: “This working group will standardize encodings for DNS queries and responses that are suitable for use in HTTPS. ”

First DoH draft published(query init)

March2017

IETF 98 Jul2017

Approved

Page 21: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DNS-over-HTTPS (DoH)

10

1987Aug2018

May2017

Oct2017

DoH WGformed

Submitted to IESG

Sep2017

DoH draft adopted

Goals: “This working group will standardize encodings for DNS queries and responses that are suitable for use in HTTPS. ”

First DoH draft published(query init)

March2017

IETF 98 Jul2017

Approved

FAST!

Page 22: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

How is DoH different to DoT?• A Use case (of many): “allowing web applications to access DNS

information via existing browser APIs”

• Discovery - MUST use a URI template (not IP address)

• Two models: • Dedicated connections (only DoH traffic) - hard to block • Mixed connections (send DoH on existing HTTPS connections)

• Better privacy? Not leaking queries

• Increased tracking: HTTP headers allow tracking of query via e.g. ‘User-agent’ (application), language, etc.

11

Specification differences

Page 23: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

How is DoH different to DoT?• A Use case (of many): “allowing web applications to access DNS

information via existing browser APIs”

• Discovery - MUST use a URI template (not IP address)

• Two models: • Dedicated connections (only DoH traffic) - hard to block • Mixed connections (send DoH on existing HTTPS connections)

• Better privacy? Not leaking queries

• Increased tracking: HTTP headers allow tracking of query via e.g. ‘User-agent’ (application), language, etc.

11

No ‘Opportunistic’

Specification differences

Page 24: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

How is DoH different to DoT?• A Use case (of many): “allowing web applications to access DNS

information via existing browser APIs”

• Discovery - MUST use a URI template (not IP address)

• Two models: • Dedicated connections (only DoH traffic) - hard to block • Mixed connections (send DoH on existing HTTPS connections)

• Better privacy? Not leaking queries

• Increased tracking: HTTP headers allow tracking of query via e.g. ‘User-agent’ (application), language, etc.

11

No ‘Opportunistic’

Specification differences

Impossible to block JUST DNS traffic

Page 25: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

How is DoH different to DoT?• A Use case (of many): “allowing web applications to access DNS

information via existing browser APIs”

• Discovery - MUST use a URI template (not IP address)

• Two models: • Dedicated connections (only DoH traffic) - hard to block • Mixed connections (send DoH on existing HTTPS connections)

• Better privacy? Not leaking queries

• Increased tracking: HTTP headers allow tracking of query via e.g. ‘User-agent’ (application), language, etc.

11

No ‘Opportunistic’

Specification differences

New privacy concerns

Impossible to block JUST DNS traffic

Page 26: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DoH Status

12

Standalone Large Scale

Servers • ~10 other test servers• Cloudflare (https://cloudflare-dns.com/dns-query) • Google (https://dns.google.com/experimental) • Quad9 (https://dns*.quad9.net/dns-query)

• 3 flavours of service

Page 27: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

Client Servers

Implementations

• Firefox config option • Chrome/Bromite

• Android ‘Intra’ App • Cloudflared • Stubby (next release)

• Various experimental

• dnsdist (WIP)• Knot resolver (patches) • Various experimental

DoH Status

12

Standalone Large Scale

Servers • ~10 other test servers• Cloudflare (https://cloudflare-dns.com/dns-query) • Google (https://dns.google.com/experimental) • Quad9 (https://dns*.quad9.net/dns-query)

• 3 flavours of service

Page 28: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

Client Servers

Implementations

• Firefox config option • Chrome/Bromite

• Android ‘Intra’ App • Cloudflared • Stubby (next release)

• Various experimental

• dnsdist (WIP)• Knot resolver (patches) • Various experimental

DoH Status

12

Standalone Large Scale

Servers • ~10 other test servers• Cloudflare (https://cloudflare-dns.com/dns-query) • Google (https://dns.google.com/experimental) • Quad9 (https://dns*.quad9.net/dns-query)

• 3 flavours of service “Moziflare”

Page 29: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DNS in Browsers• Some already have their own DNS stub (e.g. Chrome) • Some already use encrypted DNS (Yandex, Tenta)

• Firefox had DoH since 61, not enabled by default• Firefox experiment being performed….

• Chrome has a DoH implementation (not exposed, not advertised) • Recent a PR to add config option • And Google has a handy recursive resolver service in 8.8.8.8…

13

Dedicated DoH connections

Page 30: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DNS in Browsers• Some already have their own DNS stub (e.g. Chrome) • Some already use encrypted DNS (Yandex, Tenta)

• Firefox had DoH since 61, not enabled by default• Firefox experiment being performed….

• Chrome has a DoH implementation (not exposed, not advertised) • Recent a PR to add config option • And Google has a handy recursive resolver service in 8.8.8.8…

13

Dedicated DoH connections

Browser vendors control the client and update frequently.

Page 31: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DoH in Browsers• Why encrypt directly from the browser? Browser folks say:

• Why DoH, not DoT? Mozilla’s answer:

14

Page 32: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DoH in Browsers• Why encrypt directly from the browser? Browser folks say:

• Why DoH, not DoT? Mozilla’s answer:

14

Selling point: “we care about the privacy of our users”

OS’s are slow to offer new DNS features (DoT/DoH)

Performance: “reduce latency within browser”

Page 33: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DoH in Browsers• Why encrypt directly from the browser? Browser folks say:

• Why DoH, not DoT? Mozilla’s answer:

14

Selling point: “we care about the privacy of our users”

OS’s are slow to offer new DNS features (DoT/DoH)

Performance: “reduce latency within browser”

Integration: “leverage the HTTPS ecosystem”

HTTPS everywhere: “it works… just use port 443, mix traffic”

Cool stuff: “JSON, Server Push, ‘Resolverless DNS’….”

Page 34: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DoH in Browsers• Why encrypt directly from the browser? Browser folks say:

• Why DoH, not DoT? Mozilla’s answer:

14

Selling point: “we care about the privacy of our users”

OS’s are slow to offer new DNS features (DoT/DoH)

Performance: “reduce latency within browser”

Integration: “leverage the HTTPS ecosystem”

HTTPS everywhere: “it works… just use port 443, mix traffic”

Cool stuff: “JSON, Server Push, ‘Resolverless DNS’….” DNS 2.0?

Page 35: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DoH in Firefox• Mozilla blogs:

• Experiment & Future plans (May 2018):

15

Dedicated DoH connections

Page 36: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DoH in Firefox• Mozilla blogs:

• Experiment & Future plans (May 2018):

15

Dedicated DoH connections

• “We’d like to turn this [DoH] on as the default for all of our users”• “Cloudflare is our ‘Trusted Recursive Resolver’ (TRR)”

Page 37: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DoH in Firefox• Mozilla blogs:

• Experiment & Future plans (May 2018):

15

Dedicated DoH connections

• “We’d like to turn this [DoH] on as the default for all of our users”• “Cloudflare is our ‘Trusted Recursive Resolver’ (TRR)”

“With this [agreement], we have a resolver that we can trust to protect users’ privacy. This means Firefox can ignore the resolver that the network

provides and just go straight to Cloudflare.”

Page 38: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DoH in Firefox• Mozilla blogs:

• Firefox Nightly ‘Experiment’ (June) & Experiment results (Aug) • Half of users opted-in: Send all DNS queries to system resolver

AND to Cloudflare, compare the results. • “Initial experiment focused on validating:

• Another experiment in Firefox Beta announced…(Sept)

16

Dedicated DoH connections

Page 39: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DoH in Firefox• Mozilla blogs:

• Firefox Nightly ‘Experiment’ (June) & Experiment results (Aug) • Half of users opted-in: Send all DNS queries to system resolver

AND to Cloudflare, compare the results. • “Initial experiment focused on validating:

• Another experiment in Firefox Beta announced…(Sept)

16

Dedicated DoH connections

1. Does the use of a cloud DNS service perform well enough to replace traditional DNS?”

Page 40: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

DoH in Firefox• Mozilla blogs:

• Firefox Nightly ‘Experiment’ (June) & Experiment results (Aug) • Half of users opted-in: Send all DNS queries to system resolver

AND to Cloudflare, compare the results. • “Initial experiment focused on validating:

• Another experiment in Firefox Beta announced…(Sept)

16

Dedicated DoH connections

RESULTS: 6ms performance overhead is acceptable “We’re committed long term to building a larger ecosystem of trusted

DoH providers that live up to a high standard of data handling.”

1. Does the use of a cloud DNS service perform well enough to replace traditional DNS?”

Page 41: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

“Trusted recursive resolver”• Tweet from Mozilla developer: “We haven't announced what that config

will be or when it will be deployed (because we're still working on on it :)).” • DNS community is in limbo waiting for this decision!

17

Page 42: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

“Trusted recursive resolver”• Tweet from Mozilla developer: “We haven't announced what that config

will be or when it will be deployed (because we're still working on on it :)).” • DNS community is in limbo waiting for this decision!

17

Impact of TRRs? Applications using default TRRs fundamentally change the existing implicit consent model for DNS:

• (Current) Log onto a network and use the DHCP provided resolver • (New?) Use an app and agree to app T&C’s (including DNS?)

Page 43: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

“Trusted recursive resolver”• Tweet from Mozilla developer: “We haven't announced what that config

will be or when it will be deployed (because we're still working on on it :)).” • DNS community is in limbo waiting for this decision!

17

Impact of TRRs? Applications using default TRRs fundamentally change the existing implicit consent model for DNS:

• (Current) Log onto a network and use the DHCP provided resolver • (New?) Use an app and agree to app T&C’s (including DNS?)

Potential centralisation of DNS resolution to a few providers?

Page 44: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

Reactions are mixed…

18

Page 45: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

Reactions are mixed…

18

Page 46: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

Reactions are mixed…

18

Page 47: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

Reactions are mixed…

18

Soon, DoH+TRR in this browser will be fully

operational!

Page 48: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

Reactions?• Ban/Block/Intercept Moziflare - ‘My network, my rules’

• Operators need visibility (TLS 1.3 deja vu) • Is it even legal?

• Threat model analysis needed: • TRR useful but only in untrusted networks? • Users need choice (US lack of net neutrality vs EU GDPR) • Government regulation of TRRs, monetary incentives for apps?

• Analysis of third party DNS by PowerDNS • Neutrality of DNS operators (CDN’s?) • Legislation for blocking/filtering/interception?

19

EPIC thread on DNSOP

Page 49: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

Reactions?• Ban/Block/Intercept Moziflare - ‘My network, my rules’

• Operators need visibility (TLS 1.3 deja vu) • Is it even legal?

• Threat model analysis needed: • TRR useful but only in untrusted networks? • Users need choice (US lack of net neutrality vs EU GDPR) • Government regulation of TRRs, monetary incentives for apps?

• Analysis of third party DNS by PowerDNS • Neutrality of DNS operators (CDN’s?) • Legislation for blocking/filtering/interception?

19

EPIC thread on DNSOP

Lots of questions…

Page 50: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

Managing many devices in enterprises

• What are Chrome, Safari, IE/Edge plans?

• What if other apps also do their own DoH/DoT?

• Loss of central point of config on an end device?• Loss of network settings as the default • DNS no longer part of the device infrastructure?

20

Page 51: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

What to do?• Think about running a DoT server in your network: for system level

resolvers e.g. Android, Stubby, systemd it is the right thing!

• Think about running a DoH server in your network: gives users the option to use that, centralisation of DNS to a few players is a bad thing!

• Watch this space and spread the word! Work in progress: • DoH discovery mechanism & Best Current Practices • More detailed DNS-OARC talk • dnsprivacy.org website & twitter

21

Page 52: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

RIPE 77 It’s DNS Jim, but not as we know it!

What to do?• Think about running a DoT server in your network: for system level

resolvers e.g. Android, Stubby, systemd it is the right thing!

• Think about running a DoH server in your network: gives users the option to use that, centralisation of DNS to a few players is a bad thing!

• Watch this space and spread the word! Work in progress: • DoH discovery mechanism & Best Current Practices • More detailed DNS-OARC talk • dnsprivacy.org website & twitter

21

Stay tuned….

Page 53: It’s DNS Jim, but not as we know it! - RIPE 77 · RIPE 77 It’s DNS Jim, but not as we know it! DNS-over-TLS (DoT) Status 6 Date Event 2015 - 2018 Implementations: Clients: Android

Thank you!